Anonymous ID: 8558ba Oct. 28, 2018, 5:06 p.m. No.3644397   🗄️.is 🔗kun   >>4485 >>4506 >>4526 >>4659 >>4691 >>4823 >>4853 >>4867

>>3643693

For Anons who don't know shit about open source community, IBM was the first to help Linux grow.

 

By joining IBM, Red Hat can deliver even more open source innovation to customers at a larger scale. Importantly, IBM has been a long time and great partner of ours, dating back to when they made a significant early investment in Linux and then became one of the first hardware platform partner to package and bring Red Hat Enterprise Linux to their customers.

Anonymous ID: 8558ba Oct. 28, 2018, 5:32 p.m. No.3644721   🗄️.is 🔗kun

>>3644485

Contributors to SELinux

 

The following organizations and individuals have contributed to the Security-enhanced Linux project. The listing of contributors is partitioned into two lists:

 

A list of the original four organizations that contributed to the initial public release of SELinux,

A list of external individuals and organizations that have contributed to SELinux since that initial release.

 

The Original Contributors

 

The National Security Agency (NSA)

 

Researchers in NSA's National Information Assurance Research Laboratory (NIARL) designed and implemented flexible mandatory access controls in the major subsystems of the Linux kernel and implemented the new operating system components provided by the Flask architecture, namely the security server and the access vector cache. The NSA researchers reworked the LSM-based SELinux for inclusion in Linux 2.6. NSA has also led the development of similar controls for the X Window System (XACE/XSELinux) and for Xen (XSM/Flask).

Network Associates Laboratories (NAI Labs)

 

The Secure Execution Environments group of NAI Labs implemented several additional kernel mandatory access controls, developed the example security policy configuration, ported to the Linux 2.4 kernel, contributed to the development of the Linux Security Modules kernel patch, and adapted the SELinux prototype to LSM.

The MITRE Corporation

 

The MITRE Corporation enhanced several common utilities to be SELinux-aware and developed application security policies and documentation for the Apache web server, Sendmail, and crond. They also developed a policy analysis tool (SLAT) and a policy generation tool (Polgen).

Secure Computing Corporation (SCC)

 

Secure Computing Corporation developed a preliminary security policy configuration for the system that was used as a starting point for NAI Labs' configuration. They also developed several new or modified utilities.

https://www.nsa.gov/What-We-Do/Research/SELinux/Contributors/

Anonymous ID: 8558ba Oct. 28, 2018, 5:47 p.m. No.3644925   🗄️.is 🔗kun   >>4951

>>3644882

Deutsche Bank recieves 95% of all real gold from Paper Gold contracts at expiration, keeping real gold artificially high.

Paper Gold is linked to Real Gold in the market.